• Title/Summary/Keyword: 기능 고려사항

Search Result 689, Processing Time 0.043 seconds

Development of e-navigation shipboard technical architecture (e-navigation 선상시스템을 위한 기술적 아키텍처 개발)

  • Shim, Woo-Seong;Kim, Sun-Young;Lee, Sang-Jeong
    • Journal of Navigation and Port Research
    • /
    • v.37 no.1
    • /
    • pp.9-14
    • /
    • 2013
  • The e-navigation has been being developed in IMO is a sort of strategy to provide user-oriented services for safe navigation and environmental protection based on the architecture and its related services complying with the user needs. At NAV $57^{th}$ meeting in 2011, the overarching e-navigation architecture was approved which represent overall relationship only between onboard and ashore elements, so more detail technical architecture for each element should be developed for implementation in view of services and systems. Considering the continuous and iterative verification of e-navigation development process required by IMO, the relationship and traceability should be took in consideration between the outcome of e-navigation process and the element of the architecture. In this paper, we have surveyed literarily the user needs, result of gap analysis and practical solutions to address them and defined the architecture elements and their relationship considering the three kinds of views of DoDAF(Architecture Framework) of US department of Defence, in result, proposed the e-navigation shipboard technical architecture.

Logical architecture for hybrid library design (하이브리드 도서관 설계를 위한 논리적 구조)

  • 김지훈;노진구
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.2
    • /
    • pp.69-92
    • /
    • 2002
  • A hybrid information service may include local and/or remote distributed services, both and electronic. Also, a hybrid information service can be described as one which an appropriate range of heterogeneous information services is presented to the user in a consistent and integrated way via a single interface. The purpose of this study is to suggest high-level requirements and logical architecture to design hybrid library. High-level requirements analysis for hybrid library need to contain baseline requirements, basic system requirements, searching, location, requesting, delivery and payment. A logical architecture need to consider logical architecture for hybrid library management system including user access points, hybrid library management system and hybrid library components and 5 layered architecture including presenter, coordinator, mediator, communicator and provider to achieve local simplicity while still supporting complex functionality of hybrid library.

A Revised MintRoute Protocol for (m,k)-firm Streams in Wireless Sensor Networks (무선 센서 네트워크에서 (m,k)-firm 스트림을 위한 MintRoute 프로토콜의 확장)

  • Kim, Ki-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.2050-2055
    • /
    • 2012
  • Since the wireless sensor networks become pervasive, various application-specific requirement have been emerged and suggested. Among them, reliability and real-time service are ones of big research challenges since sensed information is useless if a packet is lost and delivered later than deadline. Even though many research works have been proposed, they was designed to meet one of both requirements. To solve above problem, in this paper, we propose how to extend current protocol to meet two requirements together. More detailed, Mint Route protocol is revised to meet specific real-time requirement, (m,k)-firm stream in wireless sensor networks. Since the main operations in MintRoute are very similar to definition of (m,k)-firm stream, extension is achieved by modifying some parts of procedure. Finally, the simulation results are given and analyzed to validate the its suitability for reliable and real-time requirement.

Architecture of Virtual Cloud Bank for Mediating Cloud Services based on Cloud User Requirements (클라우드 사용자 요구사항 기반으로 클라우드 서비스 중개를 위한 가상 클라우드 뱅크 아키텍처)

  • Park, Joonseok;An, Youngmin;Yeom, Keunhyuk
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1090-1099
    • /
    • 2015
  • The concept of Cloud Service Brokerage (CSB) has been introduced as a result of the expansion of the cloud-computing paradigm. Cloud services that provide similar functionality are registered with a CSB. A CSB intermediates cloud services between cloud users and providers. However, there are differences in the price and performance offered by each of the cloud providers. Thus, cloud users have difficulty in finding suitable services to use. Therefore, a CSB is required in order to provide an approach for cloud services to fulfill the requirements of cloud users. In this paper, we propose a virtual cloud bank architecture that includes both a Service Analysis Model (SAM) that can be used to specify and analyze various cloud services and a requirement analysis method that can be used to collect and analyze the cloud user requirements. The VCB architecture that is herein proposed can be used as a reference architecture to provide user-centric cloud services.

Analysis of the Needs of Middle and Elder Generation on Serious Game for the Elderly (노인용 기능성 게임개발을 위한 중노년층의 수요분석)

  • Lee, Yoon-Jung;Ahn, Joon-Hee;Lim, Kyunq-Choon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.75-101
    • /
    • 2009
  • The purpose of this article is to analyze the needs of middle and elder generation about serious game for the elderly. The results of this study are; (1) elder generation prefers leisure activities such as mountain climbing, yoga, golf, walking and travel, etc., for health, interest, the development for oneself and relieving stress; (2) they don't prefer game activity for leisure, but prefer to use serious game for health, simulation, medical treatment and sports than middle generation; (3) elder generation has various characteristics and needs so that we should consider their demographical variables when we research and develop serious game contents for the elderly.

An Overview of Using Serious Games for the Effective Development in Health and Medicine (보건 의료용 기능성 게임의 효과적 개발 방향 연구)

  • Lee, Hye Rim;Jeong, Eui Jun
    • Journal of Korea Game Society
    • /
    • v.13 no.4
    • /
    • pp.73-90
    • /
    • 2013
  • Serious games allow learners to experience situations that are impossible in the real world for various purposes. To date the major applications of serious games include military, government, education, corporate and healthcare applications. This paper aims to provide an overview of the applications of serious games for various health-related purposes, particularly for Health and Medicine education, health risk prevention, behavioral intervention, and disease self-management. These games identified numerous papers reporting empirical evidence about the impacts and outcomes. There is potential promise for serious games to improve health outcomes. We discuss implications of using serious games for health-related purposes and future direction for research in this area.

Procedure and Consideration to Build Flood Disaster Prevention System (홍수재해대응시스템 구축을 위한 절차 및 고려사항)

  • Lee, Eul-Rae;Lee, Seung-Yoon;Hwang, Eui-Ho;Lee, Gwang-Man
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.827-831
    • /
    • 2010
  • 홍수범람 또는 피해에 의해 발생한 인명피해 및 재산손실과 이를 치유하기 위해 구호 복구에 들어가는 노력 등 수해가 가져오는 여러 가지 사회경제적 역기능은 홍수의 특성을 정확하게 이해하고 이를 예방하기 위한 적절한 계획수립 및 시행을 포함하는 과학적인 홍수분석시스템을 도입해서 홍수를 사전에 예방하거나 경감할 수 있는 수방대책을 수립하는 것이 방안이 될 수 있다. 우리나라의 하천에 대한 홍수재해특성은 체계적인 하천정비의 미비, 하천제방, 호안시설의 붕괴 및 유실 등이 있을수 있으며, 또한 저수지 소류지 보 등의 파제가 홍수시 잦은 발생을 초래하고 있다. 하천부속시설물(수문, 갑문, 방수구 등)의 기능 및 제방과의 접속부실은 최근에 많이 발생하는 하천의 피해양상이 된다. 하천유역관리 및 방제의 비구조물적인 요인으로는 하천유역의 개발에 의한 유출요인의 증대가 있으며, 하천연안 저지대의 난개발로 인한 상습침수 지역조장 등이 요인이 될 수 있다. 또한 소하천, 지방하천 및 국가하천의 분리관리로 인한 일관성있는 하천관리가 미비한 점도 있다. 항상 피해가 발생한 후 원상복구에 치중하는 복구계획과 환경단체 및 방제조직 그리고 제도 및 법규의 미비도 홍수재해의 원인이 될 수 있다. 우리나라는 지역특성 및 강우특성에 따라 많은 차이를 나타내기 때문에 그 특성에 적합한 홍수재해대응시스템을 구축해야 하는 것도 충분히 고려해야 한다.

  • PDF

A Design of Fault Prediction Model for Software Integration Test (소프트웨어 통합테스트를 위한 결함예측모델 설계)

  • Kim, Myeong-Shin;Kang, Dongsu;Baik, Doo-kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.969-972
    • /
    • 2010
  • 소프트웨어 제품의 품질을 보장하기 위해서는 제품을 개발하는 단계에 미리 결함율을 예측하여 원하는 수준의 품질을 확보하는 것이 중요하다. 결함은 사용자의 요구사항이 제품으로 구현되고 기능에 대한 테스트가 수행되는 단계에 가장 객관적이며 정량적으로 관리될 수 있다. 따라서 본 논문에서는 통합테스트에 대한 계획을 수립하는 단계에 제품에 대한 결함율을 미리 예측하여 제품 결함율이 조직의 관리범위에 들어올 수 있도록 통제하는 결함예측모델을 제안한다. 조직의 제품 결함율 베이스라인을 설정하고 통합테스트 결함율에 영향을 미치는 변수들과의 회귀분석을 통해 통합테스트 결함예측모형을 구축한다. 또한 제품 결함율에 영향을 미치는 변수들과의 회귀분석을 통해 제품 결함예측모형을 구축하고 결함예측모형을 활용해 제품 결함율을 분석 및 통제한다. 본 논문에서 제안한 결함예측모델은 실제 프로젝트에 적용하여 실효성을 검증하였으며 제품이 완성되기 전에 결함율을 예측하여 통제할 수 있게 함으로써 소프트웨어 품질을 향상한다.

A Study on Attack Pattern and Analysis System against SIP Signaling Message-based DoS (SIP 호 설정 메시지기반 서비스 거부 공격패턴 및 분석시스템에 관한 연구)

  • Ha, Do-Yoon;Kim, Hwan-Kuk;Ko, Kyoung-Hee;Lee, Chang-Yong;Kim, Jeong-Wook;Jeong, Hyun-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.653-654
    • /
    • 2009
  • 인터넷전화의 활성화와 더불어 SIP 프로토콜의 사용이 증가하고 있다. 최근 DDoS 공격이 주요위협으로 이슈가 되고 있으며, 향후 SIP관련 서비스 대상 서비스 거부 공격 위협도 증가할 것으로 예상된다. 본 논문에서는 SIP 프로토콜의 특성을 이용한 SIP서비스 거부 공격들의 유형을 살펴보고, SIP 프로토콜의 특성을 이용한 서비스거부 공격 탐지를 위한 고려사항을 바탕으로 분석시스템 아키텍처를 제안한다. SIP서비스 거부공격의 유형은 분류 기준에 따라 다양할 수 있으나, 본 논문에서는 SIP 프로토콜의 특성을 이용한 공격 기법을 대상으로 한다. SIP서비스 거부 공격 트래픽 분석을 위해 정보수집, 정보분석, 정보관리 기능을 고려한다.

A Study on Security Requirements for 5G Base Station (5G 기지국에 대한 보안성평가기준 연구)

  • Hong, Paul;Kim, Yejun;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.919-939
    • /
    • 2021
  • As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high density due to their characteristics, and are connected to user terminals to provide services. Therefore, if the base station is damaged by a malicious attacker, it is expected to cause great damage to users and society as a whole. So the need for secure communication equipment such as 5G base stations has emerged. Therefore, in this paper, we propose the security functional requirements derived using threat modeling, a systematic methodology for 5G base stations, and the security assurance requirements at the level that can cope with the backdoor issues. The security requirements proposed in this paper can be used for base station design and development to construct a secure network environment as a security evaluation standard for 5G base stations.